摘要:
An asynchronous and opportunistically available scheme under which a user's e-mail (or a document including e-mail content) is rendered immediately, and later updated with appropriate advertisements if and when they became available, is described. This scheme ensures that the availability of advertisements will not adversely affect the rendering of the e-mail content. For example, a Web-based e-mail server may facilitate the serving of advertisements with e-mail by (a) accepting a request for a document including e-mail, (b) generating a request identifier, (c) serving the requested document in association with the request identifier, and (d) obtaining at least one ad relevant to content of the e-mail. The Web-based e-mail server may further (e) store the obtained ad(s), (f) accept an ad request, (g) read the stored ad(s) using information from the ad request, and (h) serve the ad(s).
摘要:
We describe, in exemplary embodiments, an on-chip Functional Built-In Self Test (“FBIST”) mechanism for testing integrated circuits with internal memory state and complex transaction based interfaces. Such interfaces include system-on-chip applications, memory chip applications, and input/output (“IO”) protocol adapter chips.
摘要:
Methods, systems, and computer program products for providing a dynamic and flexible media gateway termination identifier are disclosed. According to one aspect, the subject matter described herein includes a method for flexibly identifying terminations within a media gateway. The method includes receiving a syntax for representing terminations of a media gateway, communicating the syntax to a network node for processing media gateway control messages, and, at the network node, processing a media gateway control message using the syntax to identify a termination of the media gateway.
摘要:
Systems and methods generate an account recovery key for a protected system. The account recovery key may comprise a plurality of words that may be supplied to regain access to an account on a protected system if the account has been lost due to the actions of a malicious user or if the password to the account has been forgotten by the user.
摘要:
Methods, systems, and computer program products for providing a dynamic and flexible media gateway termination identifier are disclosed. According to one aspect, the subject matter described herein includes a method for flexibly identifying terminations within a media gateway. The method includes receiving a syntax for representing terminations of a media gateway, communicating the syntax to a network node for processing media gateway control messages, and, at the network node, processing a media gateway control message using the syntax to identify a termination of the media gateway.
摘要:
An ADSL transceiver has a sleep state, in which the received signal is not fully processed, thus reducing a load on a host processor hosting the ADSL transceiver. By arranging for the transceiver to be in a normal state when data is being received or expected to be received, the chance of missing data when not fully processing the received signal is reduced. The transceiver can be prompted to exist the sleep state when data is being transmitted and/or periodically. If no data is detected after a period of time in the normal state, the transceiver returns to the normal state. To avoid introducing errors are the receive section of the transceiver returns to full operation, selected outputs of the transceiver are blocked or ignored by higher layers. To quickly recover from a sleep mode, the receive section might perform minimal maintenance operations, such as maintaining timing and logical boundaries, such as frame counters, interleave boundaries and cell boundaries.
摘要:
Methods, systems, apparatuses, and computer program products for improving efficiency in transfer of content to mobile devices are provided. In a first aspect, hashing is used in a synchronization server to determine whether objects have changed, and therefore need to be updated on the mobile device and/or on the mobile device server. For example, databases are hashed on a record-by-record basis. Records determined to be changed are transmitted to the mobile device and/or updated on the synchronization server. In another embodiment, errors occurring during attempts to obtain unavailable web content are cached (i.e., “negative caching”). The cached errors are accessed during subsequent attempts to obtain the unavailable web content to avoid spending time on the subsequent attempts.